Analysis
-
max time kernel
1799s -
max time network
1689s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 07:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/marcusmigl/ExitLag
Resource
win10v2004-20240226-en
General
-
Target
https://github.com/marcusmigl/ExitLag
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133553078760698148" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2348 chrome.exe 2348 chrome.exe 2664 chrome.exe 2664 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2348 chrome.exe 2348 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2348 chrome.exe Token: SeCreatePagefilePrivilege 2348 chrome.exe Token: SeShutdownPrivilege 2348 chrome.exe Token: SeCreatePagefilePrivilege 2348 chrome.exe Token: SeShutdownPrivilege 2348 chrome.exe Token: SeCreatePagefilePrivilege 2348 chrome.exe Token: SeShutdownPrivilege 2348 chrome.exe Token: SeCreatePagefilePrivilege 2348 chrome.exe Token: SeShutdownPrivilege 2348 chrome.exe Token: SeCreatePagefilePrivilege 2348 chrome.exe Token: SeShutdownPrivilege 2348 chrome.exe Token: SeCreatePagefilePrivilege 2348 chrome.exe Token: SeShutdownPrivilege 2348 chrome.exe Token: SeCreatePagefilePrivilege 2348 chrome.exe Token: SeShutdownPrivilege 2348 chrome.exe Token: SeCreatePagefilePrivilege 2348 chrome.exe Token: SeShutdownPrivilege 2348 chrome.exe Token: SeCreatePagefilePrivilege 2348 chrome.exe Token: SeShutdownPrivilege 2348 chrome.exe Token: SeCreatePagefilePrivilege 2348 chrome.exe Token: SeShutdownPrivilege 2348 chrome.exe Token: SeCreatePagefilePrivilege 2348 chrome.exe Token: SeShutdownPrivilege 2348 chrome.exe Token: SeCreatePagefilePrivilege 2348 chrome.exe Token: SeShutdownPrivilege 2348 chrome.exe Token: SeCreatePagefilePrivilege 2348 chrome.exe Token: SeShutdownPrivilege 2348 chrome.exe Token: SeCreatePagefilePrivilege 2348 chrome.exe Token: SeShutdownPrivilege 2348 chrome.exe Token: SeCreatePagefilePrivilege 2348 chrome.exe Token: SeShutdownPrivilege 2348 chrome.exe Token: SeCreatePagefilePrivilege 2348 chrome.exe Token: SeShutdownPrivilege 2348 chrome.exe Token: SeCreatePagefilePrivilege 2348 chrome.exe Token: SeShutdownPrivilege 2348 chrome.exe Token: SeCreatePagefilePrivilege 2348 chrome.exe Token: SeShutdownPrivilege 2348 chrome.exe Token: SeCreatePagefilePrivilege 2348 chrome.exe Token: SeShutdownPrivilege 2348 chrome.exe Token: SeCreatePagefilePrivilege 2348 chrome.exe Token: SeShutdownPrivilege 2348 chrome.exe Token: SeCreatePagefilePrivilege 2348 chrome.exe Token: SeShutdownPrivilege 2348 chrome.exe Token: SeCreatePagefilePrivilege 2348 chrome.exe Token: SeShutdownPrivilege 2348 chrome.exe Token: SeCreatePagefilePrivilege 2348 chrome.exe Token: SeShutdownPrivilege 2348 chrome.exe Token: SeCreatePagefilePrivilege 2348 chrome.exe Token: SeShutdownPrivilege 2348 chrome.exe Token: SeCreatePagefilePrivilege 2348 chrome.exe Token: SeShutdownPrivilege 2348 chrome.exe Token: SeCreatePagefilePrivilege 2348 chrome.exe Token: SeShutdownPrivilege 2348 chrome.exe Token: SeCreatePagefilePrivilege 2348 chrome.exe Token: SeShutdownPrivilege 2348 chrome.exe Token: SeCreatePagefilePrivilege 2348 chrome.exe Token: SeShutdownPrivilege 2348 chrome.exe Token: SeCreatePagefilePrivilege 2348 chrome.exe Token: SeShutdownPrivilege 2348 chrome.exe Token: SeCreatePagefilePrivilege 2348 chrome.exe Token: SeShutdownPrivilege 2348 chrome.exe Token: SeCreatePagefilePrivilege 2348 chrome.exe Token: SeShutdownPrivilege 2348 chrome.exe Token: SeCreatePagefilePrivilege 2348 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe 2348 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2348 wrote to memory of 3040 2348 chrome.exe 86 PID 2348 wrote to memory of 3040 2348 chrome.exe 86 PID 2348 wrote to memory of 812 2348 chrome.exe 92 PID 2348 wrote to memory of 812 2348 chrome.exe 92 PID 2348 wrote to memory of 812 2348 chrome.exe 92 PID 2348 wrote to memory of 812 2348 chrome.exe 92 PID 2348 wrote to memory of 812 2348 chrome.exe 92 PID 2348 wrote to memory of 812 2348 chrome.exe 92 PID 2348 wrote to memory of 812 2348 chrome.exe 92 PID 2348 wrote to memory of 812 2348 chrome.exe 92 PID 2348 wrote to memory of 812 2348 chrome.exe 92 PID 2348 wrote to memory of 812 2348 chrome.exe 92 PID 2348 wrote to memory of 812 2348 chrome.exe 92 PID 2348 wrote to memory of 812 2348 chrome.exe 92 PID 2348 wrote to memory of 812 2348 chrome.exe 92 PID 2348 wrote to memory of 812 2348 chrome.exe 92 PID 2348 wrote to memory of 812 2348 chrome.exe 92 PID 2348 wrote to memory of 812 2348 chrome.exe 92 PID 2348 wrote to memory of 812 2348 chrome.exe 92 PID 2348 wrote to memory of 812 2348 chrome.exe 92 PID 2348 wrote to memory of 812 2348 chrome.exe 92 PID 2348 wrote to memory of 812 2348 chrome.exe 92 PID 2348 wrote to memory of 812 2348 chrome.exe 92 PID 2348 wrote to memory of 812 2348 chrome.exe 92 PID 2348 wrote to memory of 812 2348 chrome.exe 92 PID 2348 wrote to memory of 812 2348 chrome.exe 92 PID 2348 wrote to memory of 812 2348 chrome.exe 92 PID 2348 wrote to memory of 812 2348 chrome.exe 92 PID 2348 wrote to memory of 812 2348 chrome.exe 92 PID 2348 wrote to memory of 812 2348 chrome.exe 92 PID 2348 wrote to memory of 812 2348 chrome.exe 92 PID 2348 wrote to memory of 812 2348 chrome.exe 92 PID 2348 wrote to memory of 812 2348 chrome.exe 92 PID 2348 wrote to memory of 812 2348 chrome.exe 92 PID 2348 wrote to memory of 812 2348 chrome.exe 92 PID 2348 wrote to memory of 812 2348 chrome.exe 92 PID 2348 wrote to memory of 812 2348 chrome.exe 92 PID 2348 wrote to memory of 812 2348 chrome.exe 92 PID 2348 wrote to memory of 812 2348 chrome.exe 92 PID 2348 wrote to memory of 812 2348 chrome.exe 92 PID 2348 wrote to memory of 3648 2348 chrome.exe 93 PID 2348 wrote to memory of 3648 2348 chrome.exe 93 PID 2348 wrote to memory of 4488 2348 chrome.exe 94 PID 2348 wrote to memory of 4488 2348 chrome.exe 94 PID 2348 wrote to memory of 4488 2348 chrome.exe 94 PID 2348 wrote to memory of 4488 2348 chrome.exe 94 PID 2348 wrote to memory of 4488 2348 chrome.exe 94 PID 2348 wrote to memory of 4488 2348 chrome.exe 94 PID 2348 wrote to memory of 4488 2348 chrome.exe 94 PID 2348 wrote to memory of 4488 2348 chrome.exe 94 PID 2348 wrote to memory of 4488 2348 chrome.exe 94 PID 2348 wrote to memory of 4488 2348 chrome.exe 94 PID 2348 wrote to memory of 4488 2348 chrome.exe 94 PID 2348 wrote to memory of 4488 2348 chrome.exe 94 PID 2348 wrote to memory of 4488 2348 chrome.exe 94 PID 2348 wrote to memory of 4488 2348 chrome.exe 94 PID 2348 wrote to memory of 4488 2348 chrome.exe 94 PID 2348 wrote to memory of 4488 2348 chrome.exe 94 PID 2348 wrote to memory of 4488 2348 chrome.exe 94 PID 2348 wrote to memory of 4488 2348 chrome.exe 94 PID 2348 wrote to memory of 4488 2348 chrome.exe 94 PID 2348 wrote to memory of 4488 2348 chrome.exe 94 PID 2348 wrote to memory of 4488 2348 chrome.exe 94 PID 2348 wrote to memory of 4488 2348 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/marcusmigl/ExitLag1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff88be09758,0x7ff88be09768,0x7ff88be097782⤵PID:3040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1896,i,3055944723116710304,4438415002560479440,131072 /prefetch:22⤵PID:812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1896,i,3055944723116710304,4438415002560479440,131072 /prefetch:82⤵PID:3648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1896,i,3055944723116710304,4438415002560479440,131072 /prefetch:82⤵PID:4488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2884 --field-trial-handle=1896,i,3055944723116710304,4438415002560479440,131072 /prefetch:12⤵PID:1076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2892 --field-trial-handle=1896,i,3055944723116710304,4438415002560479440,131072 /prefetch:12⤵PID:4412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 --field-trial-handle=1896,i,3055944723116710304,4438415002560479440,131072 /prefetch:82⤵PID:4532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4984 --field-trial-handle=1896,i,3055944723116710304,4438415002560479440,131072 /prefetch:82⤵PID:5028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4540 --field-trial-handle=1896,i,3055944723116710304,4438415002560479440,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2664
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1252
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:2360
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:3408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56718b169731eace89a7552ec0c84fb65
SHA124ead60ea70c9a67ffe95d995d55f88b048a2ccb
SHA25697c2bcbc47422f55959d7e01369af1d32c8262a12664dbc9f6db9d39c0c31d09
SHA51261414915e1dd6e917d7541c3708a75b910b9f8eb359c0b277e55e295f13c6c7dc02c8c06b00e01866a2e00f3d12ac3ee44818068efafe5cab04bee9f41f0243d
-
Filesize
1KB
MD5e4d54af7a9489820d8a74f42b9adee78
SHA12b1e23e409bd2955e4b32724ba77d9e15b78baa1
SHA25692a838c7d42ff69de0ee89f506813c834434d2b872c78dd0a3af05422d282df5
SHA51275f1198522e5ef6b121eb00dc22f1f818284a6a416653ff0ee80bc93d8ccfab144d68faea92707cd5fbf1616e0c37e45dd3f4fb9250b280fea6ddc9c6aeae244
-
Filesize
1KB
MD50d7e3dcc478e8f5960f627b33d5be542
SHA1419bf5eab0410ac2b3b7f4c108338f4ea3a18df9
SHA2560123cbde98fda587ba676b065195b88e95114fde822ec7ebcf624fe71a77b7cb
SHA512b3052b336712567f44c4a071d59e63c74af06732285424a6dae569dd59186678ad98df441ceee0a141dc0bfa85f2894404d429641d257d5ed509e4f2f2233141
-
Filesize
1KB
MD521017984c0b432a8801d3fafe07fbcb0
SHA11558014095e10051a5b5a992ff699b8fa949c0cc
SHA256a1aec3c54534d5a5c8ca6aaebc87d9cd34201d945602d4cfd5cc34ac66f364e2
SHA5125adb57ef56b4bc5c229073fdafc0c1e15831fa1760f92e2a5dbc3801f29da0d60fa992a10d32e01521b7bad527b5d43ac4a54f68e37ca8cea4cf08e458fa3a90
-
Filesize
1KB
MD55d815ef8c3309dfd05233e8872bf4b0e
SHA14da2017fe52ba7bc663b37e68fc236ba98f805ec
SHA256e77dbee4159b5a75fbc4a26cc9d125dfd6af19de23142294d833ad09454f144d
SHA512d5f386984a694508454b077a931e1193a82eb9e6b2c68320dcc70f72022b689264fef3bf6151662921927c9eb4a00da9e5073c76035a323ff32764a3a9b61cff
-
Filesize
6KB
MD5ed03144c573cfdaa0de281b44b4fdf3f
SHA1b4e7957d948928b8aae95c7e82c6ab4fbf1277a6
SHA256ebdc3343f33edbc38e092a5f3cd1710038951188c6ffb9be7a3f5eda2218e853
SHA512e20d0d8a28f67954e7f8c619afa4735fb671b3509ec438dc4a01cd952f4f6020204574e2d1455ef26f630a7737b812c5648378bd8255ec42653ed7d6e3a9aa32
-
Filesize
253KB
MD5fa54e0f6d05d130cd09e25efe089c587
SHA16c4fa7521004b6cef4f563b227f0cb4e3df88d9c
SHA2566004874daa1aea6d74f7e1a6b333de262e908b1445a323c426e4f35376de755c
SHA512867b525bc6cee92c00193ceb1daf8d192f436b8d1b358c6d5bce0994f953929ed47e645b42a74debc992f427a6641bf2fad04787b7eea1b2d6ea86ce4d74dc5c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd